Sciweavers

1088 search results - page 125 / 218
» Independence of Negative Constraints
Sort
View
GSEM
2007
Springer
15 years 4 months ago
A Policy Language for Integrating Heterogeneous Authorization Policies
In order to manage and enforce multiple heterogeneous authorization policies in distributed authorization environment, we defined the root policy specification language and its cor...
Wei Zhou, Christoph Meinel
ICA
2007
Springer
15 years 4 months ago
Extraction of Atrial Activity from the ECG by Spectrally Constrained ICA Based on Kurtosis Sign
Abstract. This paper deals with the problem of estimating atrial activity during atrial fibrillation periods in the electrocardiogram (ECG). Since the signal of interest differs ...
Ronald Phlypo, Vicente Zarzoso, Pierre Comon, Yves...
COMPGEOM
2006
ACM
15 years 4 months ago
Refolding planar polygons
Abstract This paper describes an algorithm for generating a guaranteed intersectionfree interpolation sequence between any pair of compatible polygons. Our algorithm builds on prio...
Hayley N. Iben, James F. O'Brien, Erik D. Demaine
97
Voted
PRDC
2005
IEEE
15 years 3 months ago
Development of Dependable Real-Time Systems with Zerberus
Although the main fault-tolerance techniques are known for a long time, there exists no consistent approach for implementing dependable applications in the sense that the fault-to...
Christian Buckl, Alois Knoll, Gerhard Schrott
WOWMOM
2005
ACM
115views Multimedia» more  WOWMOM 2005»
15 years 3 months ago
Precise Distributed Localization Algorithms for Wireless Networks
We propose in this paper reliable and precise distributed localization algorithms for wireless networks: iterative multidimensional scaling (IT-MDS) and simulated annealing multid...
Saad Biaz, Yiming Ji